A randomized 25 question test from a pool of 761 questions, good luck!
There are numerous threats to the security of a DCS. Which of the security measures below would use a password on the BIOS to prevent unauthorized changes?
Which of the answers below best represents the recommended standard that uses an end device circuit to provide the protocols for error detection?
With any GUI, there are opportunities to use gathered data visually. Which of the methods below would be best described as one that would allow an operator to anticipate the tendencies of a process by the creation of a short term measurement values plot?
Each network layer for a DCS has it's own specialized equipment or software. Which of the layers below would make use of firewall in its connection to the control network?
Each network layer for a DCS has it's own specialized equipment or software. Which of the layers below would make use of a Foundation Fieldbus protocol?
A typical DCS has at least four layers in it's architecture. Valves, switches and transmitters are all under the direct control of which of the layers below?
Field instrument to PLC is best defined by which of the answers below?
Software for programming or configuration is an integral part of any HMI. Which of the interfaces below can be best described as having the ability to design the GUI, including configuring tags and introducing specialized scripting?
Using the table provided, which answer best represents the letter"H" in hexadecimal?
There are several layer within the a typical DCS., each with it's own responsibilities. Which of the levels below is responsible for the maintenance and configuration of the control system?
One of the layers of the OSI manages access to be able to transmit data. Which of the answers below represents that layer?
There are numerous I/O modules that a typical DCS has access to. Which of the modules below is described as one that the scanner module receives information communicated digitally from up to 63 supported devices?
Subnet masks in IPv4 are used to divide an existing network. A class B network with 2 nodes, one with an IP address of 128.0.0.1 and a mask of 255.255.0.0. Which of the answers below reflects the address the other node must have for the two nodes to communicate?
Model based network devices are at the user level of Ethernet/IP. Information of a devices type and classification would be contained in which of the text files below?
Which of the components below best represents the letter "D"?
There are several different network access methods available to wired Ethernet. Which of the methods below is the one used by wired Ethernet?
Digital signals are, either specific or transitory, voltage levels represent states of logic. Which of the signal encoding methods below uses voltage transitions to represent logic states?
Voltage to voltage converters are best defined as which of the answers below?
In the protocol specifications of Modbus, there are only four types of registers that can be accessed by the master. Which of the answers below expresses the register size and permissions of an input status register?
There are several different ways to let an operator know about an alarm in any HMI. Which of the answers below would best be described as a horn being sounded?
Communication that is wireless in a SCADA system is common. Which of the communication methods below would be best defined as one that is a last resort, when no other means of communication is available?
In the unbalanced signal transmission system, which answer best represents the number 2?
The numerous tasks that are accomplished at the same time in a DCS, is a result of the configured software programs that it has . Which of the software programs below will governed by IEC-61804-2?
The wired Ethernet transmission standards are defined by the OSI model layers. Which of the answers below is one of those defining layers?
There are several layers in the DCS architecture. Which of the levels below would have direct control over the alarming system?